CN113660097B - Data transfer system, data transfer method and device based on block chain - Google Patents
Data transfer system, data transfer method and device based on block chain Download PDFInfo
- Publication number
- CN113660097B CN113660097B CN202110943572.3A CN202110943572A CN113660097B CN 113660097 B CN113660097 B CN 113660097B CN 202110943572 A CN202110943572 A CN 202110943572A CN 113660097 B CN113660097 B CN 113660097B
- Authority
- CN
- China
- Prior art keywords
- data
- personal
- personal association
- holder
- association data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012546 transfer Methods 0.000 title claims abstract description 111
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000013475 authorization Methods 0.000 claims abstract description 104
- 238000013524 data verification Methods 0.000 claims description 54
- 238000012545 processing Methods 0.000 claims description 25
- 238000012795 verification Methods 0.000 claims description 20
- 238000004590 computer program Methods 0.000 claims description 10
- 238000004891 communication Methods 0.000 claims description 9
- 238000000586 desensitisation Methods 0.000 claims description 9
- 238000003860 storage Methods 0.000 claims description 8
- 230000000977 initiatory effect Effects 0.000 claims description 6
- 230000007246 mechanism Effects 0.000 description 37
- 238000002360 preparation method Methods 0.000 description 35
- 230000008569 process Effects 0.000 description 20
- 238000010586 diagram Methods 0.000 description 15
- 238000011835 investigation Methods 0.000 description 13
- 230000004044 response Effects 0.000 description 9
- 230000008901 benefit Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 238000012800 visualization Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 5
- 238000009826 distribution Methods 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 230000010354 integration Effects 0.000 description 2
- 238000005304 joining Methods 0.000 description 2
- 238000005065 mining Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 241000579895 Chlorostilbon Species 0.000 description 1
- 238000009825 accumulation Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013075 data extraction Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 239000010976 emerald Substances 0.000 description 1
- 229910052876 emerald Inorganic materials 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000010977 jade Substances 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- ZLIBICFPKPWGIZ-UHFFFAOYSA-N pyrimethanil Chemical compound CC1=CC(C)=NC(NC=2C=CC=CC=2)=N1 ZLIBICFPKPWGIZ-UHFFFAOYSA-N 0.000 description 1
- 230000007115 recruitment Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 239000010979 ruby Substances 0.000 description 1
- 229910001750 ruby Inorganic materials 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The disclosure provides a data transfer system, a data transfer method and a data transfer device based on a block chain. The data transfer system comprises a data transfer device and a server, wherein each data holder of the data transfer device forms a alliance chain network, the data transfer device is configured to acquire personal association data from each data holder, and record the use trace information of the personal association data on a first block chain when the personal association data in the alliance chain network is used, and the use trace information at least comprises a data user and a data holder corresponding to the used personal association data; and the server is configured to respond to the personal association data authorization request of the data requesting party, forward the personal association data authorization request to the authorization object, acquire the personal association data of the authorization object from the data forwarding device after the authorization object agrees to the authorization, and send the acquired personal association data to the data requesting party.
Description
Technical Field
The disclosure relates to the technical field of credit investigation, in particular to a data transfer system, a data transfer method and a data transfer device based on a block chain.
Background
With the continuous perfection of the social credit system, personal credit is widely applied to various business credit sales, credit transaction, recruitment and other fields. With the wide application of personal credit, the personal credit is more and more emphasized, and the personal credit comprises relatively wide and accurate personal characteristic information, so that the personal credit has extremely high market value. For example, the problem of restricting marketing by an enterprise due to insufficient consumer information may be addressed to an enterprise, thereby helping the enterprise contact a target customer in the most efficient and economical manner.
Currently, information resources for personal credit are widely distributed in financial institutions, local financing platforms, internet financial institutions and the like, and information sharing is not caused between the institutions based on compliance and competition concerns, so that information islands are caused. Because of the existing information island, the source of the acquired information of the existing personal credit investigation system is single, which is not beneficial to the omnibearing evaluation of personal credit investigation, and the credit investigation information is relatively blocked, so that the authority of the credit investigation system is affected.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a data streaming system, a data streaming method and a device based on a blockchain. In the data circulation system disclosed by the invention, the data transfer device and each data holder in the data circulation system form a alliance chain network, and the data circulation system can acquire personal associated data from each data holder, so that the data source is expanded, and a single personal associated data source is avoided. In addition, the use trace information of each time the personal association data is used is recorded on the first blockchain, benefit distribution is facilitated according to the use trace information, the personal association data held by each data holder is commercialized based on the scheme of the disclosure, so that each data holder is maintained as a blockchain node in the alliance chain network to continuously provide the personal association data for the data circulation system, and in addition, more data holders are attracted to join the alliance chain network in a manner of commercializing the personal association data, so that the source of the personal association data is further widened.
According to one aspect of the present disclosure, there is provided a blockchain-based data streaming system including data relay devices each of which forms a coalition chain network, and a server communicably connected to the data relay devices, the data relay devices configured to acquire individual related data from each of the data holders, and record usage trace information of the individual related data on a first blockchain when the individual related data in the coalition chain network is used, the usage trace information including at least a data user and a data holder corresponding to the individual related data being used; and the server is configured to respond to a personal association data authorization request of a data requesting party, forward the personal association data authorization request to an authorization object, acquire the personal association data of the authorization object from the data transfer device after the authorization object agrees to authorization, and send the acquired personal association data to the data requesting party.
According to another aspect of the present disclosure, there is also provided a blockchain-based data streaming method performed by a data streaming system including a data relay device and a server communicably connected to the data relay device, the data relay device and respective data holders forming a coalition chain network, the data streaming method comprising: responding to a personal association data authorization request of a data requesting party, and forwarding the personal association data authorization request to an authorization object; when the authorization object agrees to authorize, corresponding personal association data from each data holder is obtained according to the personal characteristic information of the authorization object; transmitting the personal association data to the data requestor; and generating corresponding usage trace information according to the personal association data and the data requesting party, and recording the usage trace information on a first blockchain, wherein the usage trace information at least comprises a data using party and a data holding party corresponding to the personal association data.
According to another aspect of the present disclosure, there is also provided a blockchain-based data transfer device applied to a data transfer system including a data transfer device and a server communicably connected to the data transfer device, the data transfer device and respective data holders forming a coalition chain network, the data transfer device comprising: at least one processor, a memory coupled with the at least one processor, and a computer program stored on the memory, the at least one processor executing the computer program to implement: responding to a personal association data authorization request of a data requesting party, and forwarding the personal association data authorization request to an authorization object; when the authorization object agrees to authorize, corresponding personal association data from each data holder is obtained according to the personal characteristic information of the authorization object; transmitting the personal association data to the data requestor; and generating corresponding usage trace information according to the personal association data and the data requesting party, and recording the usage trace information on a first blockchain, wherein the usage trace information at least comprises a data using party and a data holding party corresponding to the personal association data.
According to another aspect of the present disclosure, there is also provided a machine-readable storage medium storing a computer program which, when executed by a processor, implements any of the above-described data streaming methods.
According to another aspect of the present disclosure, there is also provided a computer program product comprising a computer program which, when executed by a processor, implements a data flow method as described in any of the above.
Drawings
A further understanding of the nature and advantages of the present disclosure may be realized by reference to the following drawings. In the drawings, similar components or features may have the same reference numerals.
FIG. 1 illustrates a schematic diagram of an example environment, according to an embodiment of the present disclosure.
Fig. 2 shows an example architecture diagram of a network of federated links with personal terminal devices in accordance with an embodiment of the present disclosure.
Fig. 3 shows an exemplary architecture diagram of a network composed of a coalition chain network composed of a data transfer device and a server and a data holder and a personal terminal device according to an embodiment of the present disclosure.
Fig. 4 shows a schematic diagram of an example of a consensus process according to an embodiment of the present disclosure.
FIG. 5 is a schematic diagram showing one example of formats of a prepare message, and an acknowledge message in a consensus process according to an embodiment of the present disclosure
Fig. 6 illustrates a flowchart of one example of a blockchain-based data streaming method in accordance with embodiments of the present disclosure.
Fig. 7 illustrates a block diagram of one example of a blockchain-based data streaming device in accordance with embodiments of the present disclosure.
Fig. 8 illustrates a block diagram of an electronic device for implementing a blockchain-based data streaming method in accordance with embodiments of the present disclosure.
Detailed Description
The subject matter described herein will be discussed below with reference to example embodiments. It should be appreciated that these embodiments are discussed only to enable a person skilled in the art to better understand and thereby practice the subject matter described herein, and are not limiting of the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the scope of the disclosure. Various examples may omit, replace, or add various procedures or components as desired. In addition, features described with respect to some examples may be combined in other examples as well.
As used herein, the term "comprising" and variations thereof mean open-ended terms, meaning "including, but not limited to. The term "based on" means "based at least in part on". The terms "one embodiment" and "an embodiment" mean "at least one embodiment. The term "another embodiment" means "at least one other embodiment". The terms "first," "second," and the like, may refer to different or the same object. Other definitions, whether explicit or implicit, may be included below. Unless the context clearly indicates otherwise, the definition of a term is consistent throughout this specification.
A blockchain is a chain data structure that sequentially links and combines data blocks in a temporal order, and cryptographically ensures that the data blocks are not tamperable and counterfeitable. Each block in the blockchain is linked to the immediately preceding block in the blockchain by including a cryptographic hash of the preceding block. Each chunk also includes a timestamp, a cryptographic hash of the chunk, and one or more transactions. The transaction that has been validated by a node of the blockchain network is hashed and forms a Merkle tree. In the Merkle tree, data at leaf nodes is hashed and for each branch of the Merkle tree, all hash values of that branch are concatenated at the root of that branch. The above process is performed for the Merkle tree up to the root node of the entire Merkle tree. The root node of the Merkle tree stores hash values representing all the data in the Merkle tree. When a hash value claims to be a transaction stored in the Merkle tree, a quick verification may be performed by determining whether the hash value is consistent with the Merkle tree structure.
A blockchain network is a network of computing nodes that is used to manage, update, and maintain one or more blockchain structures. In this specification, a blockchain network may include a public blockchain network, a private blockchain network, or a federated blockchain network.
In a common blockchain network, the consensus process is controlled by nodes of the consensus network. For example, there may be thousands of entity collaboration processes in a public blockchain network, each entity operating at least one node in the public blockchain network. Thus, a public blockchain network may be considered a public network of participating entities. In some examples, most entities (nodes) must sign each block in order and add the signed block to the blockchain of the blockchain network. Examples of public blockchain networks may include specific peer-to-peer payment networks.
Public chain networks support public transactions. Public transactions are shared among all nodes within the public chain network and stored in the global blockchain. Global blockchains refer to blockchains that replicate across all nodes. To achieve consensus (e.g., agree to add blocks to a blockchain), a consensus protocol is implemented within the public chain network. Examples of consensus protocols include, but are not limited to: proof of work (POW), proof of rights (POS), and proof of authority (POA).
A private chain network is provided for a particular entity. The read-write rights of each node in the private chain network are tightly controlled. Thus, private chain networks are also commonly referred to as licensed networks, which limit who is allowed to participate in the network and the level of network participation (e.g., only in certain transaction scenarios). In private blockchain networks, various types of access control mechanisms may be used (e.g., existing participants voting for adding new entities, regulatory body control permissions, etc.).
The federated chain network is private between the participating entities. In a federated chain network, the consensus process is controlled by the authorizing node. For example, a federation consisting of several (e.g., 10) entities (e.g., traditional financial institutions, internet financing platforms, insurance companies) may operate a federation chain network, each entity operating at least one node in the federation chain network. Thus, a federated chain network may be considered a private network of participating entities. In some examples, each participating entity (node) must sign each chunk in order and add that chunk to the blockchain. In some examples, each chunk may be signed by a subset (e.g., at least 7 entities) of participating entities (nodes) and added to the blockchain.
Fig. 1 illustrates a schematic diagram of an example environment 100, according to an embodiment of the disclosure. As shown in fig. 1, the example environment 100 allows entities to participate in a blockchain network 102. The blockchain network 102 may be, for example, a federated chain network. The example environment 100 may include computing devices 104, 106, 108, 110, 112 and a network 114. In an embodiment, the network 114 may include a local area network (Local Area Network, LAN), a wide area network (Wide Area Network, WAN), the internet, or a combination thereof, and is connected to websites, user devices (e.g., computing devices), and backend systems. In an embodiment, the computing devices 104, 106, 108, 110, 112 may access the network 114 through wired and/or wireless communication.
In some cases, the computing devices 106, 108 may be nodes (not shown) of a cloud computing system, or each computing device 106, 108 may be a separate cloud computing system, including multiple computers interconnected by a network and operating as a distributed processing system.
In an embodiment, the computing devices 104-108 may run any suitable computing system that enables it to function as a node in the blockchain network 102. For example, computing devices 104-108 may include, but are not limited to, servers, desktop computers, notebook computers, tablet computing devices, and smartphones. In an embodiment, the computing devices 104-108 may be attributed to related entities and used to implement corresponding services, e.g., that may be used to manage transactions between an entity or entities.
In one embodiment, computing devices 104-108 each store a blockchain ledger corresponding to blockchain network 102. The computing device 104 may be (or include) a web server for providing browser functionality that may provide visual information related to the blockchain network 102 based on the network 114. In some cases, the computing device 104 may not participate in the blockchain verification, but rather monitor the blockchain network 102 to determine when other nodes (which may include computing devices 106-108, for example) agree on, and generate corresponding blockchain visual user interfaces therefrom.
In an embodiment, computing devices 110 and 112 may be client devices connected to blockchain network 102. For example, computing device 110 may be a terminal device used by individuals registered with the data flow mechanism, and computing device 112 may be a terminal device at the data holder. Computing devices 110 and 112 may include, but are not limited to, servers, desktop computers, notebook computers, tablet computing devices, and smartphones.
In an embodiment, computing device 104 may receive a request initiated by a client device (e.g., computing device 110 or computing device 112) for a blockchain visualization user interface. In some cases, a node of the blockchain network 102 may also act as a client device, such as a user of the computing device 108 may send the request to the computing device 104 using a browser running on the computing device 108.
In response to the request, computing device 104 may generate a blockchain visualization user interface (e.g., a web page) based on the stored blockchain ledger and send the generated blockchain visualization user interface to the requesting client device. If the blockchain network 102 is a private-type or federated-type blockchain network, the request for the blockchain visualization user interface may include user authorization information that may be verified by the computing device 104 before the blockchain visualization user interface is generated and sent to the requesting client device and returned to the corresponding blockchain visualization user interface after verification passes.
The blockchain visualization user interface may be displayed on the client device (e.g., may be displayed in the user interface 116 shown in fig. 1). When the blockchain ledger is updated, the display of the user interface 116 may also be updated accordingly. Further, user interaction with the user interface 116 may result in a request for other user interfaces, such as displaying a blocklist, blocklist details, transaction list, transaction details, account list, account details, contract list, contract details, or search results page generated by a user conducting a search over a blockchain network, or the like.
In the present disclosure, the data relay device and each data holder in the data circulation system may be formed as a coalition chain network. In the federated chain network, the data relay device and each data holder may each be a blockchain node or part thereof. And communicably connected between the data relay device and any two of the respective data holders.
Fig. 2 shows an example architectural diagram of a network 200 of federated chain networks and personal terminal devices in accordance with an embodiment of the present disclosure.
The data flow system provided by the present disclosure may be applied to a data flow mechanism for operating the data flow system, so that the data flow mechanism may be used as a blockchain node or a component thereof in a federated chain network.
In one example, the data transfer mechanism may act as a third party data transfer mechanism, connecting the data holder and the data requester, respectively. The data transfer mechanism may transfer the data in real time, for example, when the data requester requests the data, the data transfer mechanism may acquire the requested data from the data holder in real time, and then forward the acquired data to the data requester after processing. In addition, the data transfer mechanism may store the data acquired from the data holder, so that when the data is requested by the data requester, the data transfer mechanism may acquire the requested data from the stored data and then forward the acquired data to the data requester. The data transfer mechanism in the present disclosure may be an authorized legal mechanism capable of performing storage, transfer, and other processing on data, where the data that the data transfer mechanism can process may include private data and core data, and the data transfer mechanism can effectively protect the private data and the core data.
As shown in fig. 2, the data-flow mechanism 210 is a blockchain node in the federated chain network 214, or a component thereof, and of course, the role played by the data-flow mechanism 210 in the federated chain network 214 is implemented by a device or apparatus in the data-flow system in which the data-flow mechanism 210 operates. The personal terminal device 230 may be communicatively coupled to the data transfer mechanism 210, and the person may be registered and authenticated at the data transfer mechanism. The data transfer mechanism 210 shown in fig. 2 is connected to a personal terminal device 230 by way of example only, and the data transfer mechanism 210 may also be communicatively connected to other registered personal terminal devices 230.
In one example, the front end APP of the data streaming mechanism 210 may be installed and run on the terminal device 230 of the individual, the registered individual may log in directly through the APP, or an unregistered individual may log in on the APP, and then the backend server authenticates the registration information, the authentication is successful, and after the registration is successful, the individual may log in on the APP on the terminal device 230.
After the person logs into the APP, a connection is established between the person and the data flow mechanism 210 via the terminal device 230 and the server. The individual can perform data request, authorization, validation, credit inquiry, asset management and other operations on the APP, and the server responds to the individual operation on the APP and performs corresponding processing.
Each data holder 220 may also be individually implemented as a blockchain node or part thereof in the federated chain network 214. Of course, the role played by each data holder 220 in federated link network 214 may be implemented by the device or apparatus operated by each data holder 220.
In addition, data streaming mechanism 210 may be communicatively coupled to each data holder 220 in federated chain network 214, and data streaming mechanism 210 may receive credit requests from each data holder 220. In addition, the data streaming mechanism 210 may be communicatively coupled to other third party mechanisms such that the data streaming mechanism 210 may receive data requests from the other third party mechanisms.
In the federated chain network, the data flow mechanism can act as an authority to authenticate the data holder joining the federated chain network, and the data flow mechanism allows the joining of the federated chain network only if the authentication passes.
In one example, the data flow mechanism may be a personal credit organization for engaging in collecting, organizing, processing, and analyzing business and personal credit information data work, issuing credit reports, providing diversified credit services, helping customers judge and control credit risk, and the like.
In the present disclosure, the data holder may be an organization, a company, an enterprise, or the like that holds a large amount of personal association data, and the personal association data held by the data holder may originate from data generated by an organization operation, a business activity, or the like. In the present disclosure, a data holder may include an internet business operating based on the internet, and the internet business in the data holder may relate to the fields of finance, communication, transportation, and the like. In addition, the data holder may also include non-internet businesses related to financial, communications, transportation, etc., and in one example, the non-internet businesses in the data holder may include traditional businesses or institutions with government endorsements.
Taking the financial field as an example, the data holder can comprise novel internet financial institutions such as internet-based financial enterprises, financing platforms and the like, and can also comprise traditional financial institutions of government endorsements such as banks, securities, local financing platforms and the like. The business scope of an internet financial institution may cover a vast amount of financial activities in the folk, such as small loan activities, etc., performed by individuals through the internet financial institution. Since a large amount of civil financial activities are conducted through internet financial institutions, so that the traditional financial institutions cannot grasp personal association data of the part of business activities, the scheme of the disclosure expands the sources of the personal association data by adding a novel internet financial institution into a alliance chain network as a data holder. When the data flow mechanism is a personal credit bureau, the personal credit bureau can implement more comprehensive and accurate personal credit bureau by expanding the source of the personal association data.
The data transfer system operated by the data transfer mechanism comprises a data transfer device and a server which is in communication connection with the data transfer device and can provide service for the front end APP of the data transfer mechanism.
Fig. 3 shows an example architecture diagram of a network 300 of a federated chain network of data transfer devices and servers and data holders and personal terminal devices in accordance with an embodiment of the present disclosure.
As shown in fig. 3, the server in the data flow system is communicatively connected with the personal terminal device. The data transfer device can be used as a blockchain node or a component part thereof in the alliance chain network to realize various functions of the blockchain node.
The data relay device is configured to acquire individual related data from respective data holders, the acquired individual related data may be stored locally, may be authorized for use by third parties, and for personal credit or the like.
In the present disclosure, the individual-related data corresponds to individuals, and the individual-related data of each individual may include all data associated with the individual, such as financial property data of loans, bank deposits, real property, equity, and the like, and data of travel records, flight records, and the like. In one example, the person's personal association data may include a specified type of data associated with the person, e.g., the specified type of data is financial asset data, then the person's personal association data includes only financial asset data associated with the person.
In one example, the personal association data may be categorized into four categories according to privacy level. The first type is absolute privacy data, and the first type of data is data unique to an individual, such as a human body feature, an identity card number, and the like. The second type is structured cross-identification data, which is data that can be obtained by structured identification of personal features, such as addresses, work units, etc. The third type is associated data, which is data that an individual shares or has associated with other individuals or institutions, such as transaction data, social data, and the like. The fourth type is public data, which includes data that has been fully disclosed or partially disclosed and data derived based on the partial disclosure, such as data disclosed by a government agency.
In this example, the first type of data and the second type of data belong to private data, for which data a desensitization is required before use. For the third type of data, the disclosed data can be directly used, and the data containing the privacy information needs to be desensitized and then used. For the fourth type of data, it can be used directly.
In one example, the personal association data for each individual may be divided into personal asset data and personal liability data. The personal asset data may be data associated with positive assets for an individual that are capable of generating revenue, such as deposit, real estate, equity, etc., asset data. The personal liability data may be negative asset-related data that is output for the benefit of the individual, such as house credits, car credits, leases, and the like. In one example, the more personal asset data a person is associated with, the more positive assets that the person is indicating, the better the personal credit accordingly. The more personal liability data the person is associated with, the more liabilities the person is indicated, and accordingly the worse the personal credits are.
In one example, when an individual is associated with a legal entity, such as a corporation, store, etc., then the individual may be associated with the legal entity's business information. At this time, the personal association data of the person may include personal subject association data and legal subject association data of the person. In this example, for an individual, it can be classified into an individual subject, which is a natural person as a right subject, and a legal subject associated with the individual subject. For example, the lending entity of a Zhang Sanjiu lend is Zhang Sanjiu, which is an individual entity, and the lending entity of a Zhang Sanjiu associated corporate lend is a corporate entity, which is a legal entity. In this example, the personal subject-related data is data directly related to a personal subject, and the legal subject-related data is data directly related to a legal subject, which in turn is directly related to a corresponding personal subject.
Further, the personal subject association data may also include personal asset data and personal liability data. The legal entity association data may include transaction amount, transaction liveness, operational stability, operational growth capacity, and regional environment data directly associated with the legal entity.
In one manner of acquiring the personal association data by the data relay device, the data relay device may broadcast a personal association data acquisition request to each data holder in the coalition chain network, and the personal association data acquisition request may include summary information of the personal association data requested by the data relay device.
In the disclosure, summary information of the personal association data may be obtained by performing data lightweight processing on the personal association data, where summary information of each personal association data corresponds to the personal association data one by one, the summary information may be key feature information in the corresponding personal association data, and the summary information may reflect data features of the corresponding personal association data. For example, one piece of personal association data is one piece of loan record data for Zhang three, which includes name, identification number, real estate certificate, loan amount, interest, loan time, repayment time, etc., and the summary information of the personal association data may be identification number, thereby facilitating the inquiry of this piece of loan record data for Zhang three by means of Zhang three's identification number.
After each data holder receives the personal association data acquisition request, the data holder can acquire abstract information from the received personal association data request, acquire the personal association data corresponding to the abstract information from the data held by the data holder, and then send the acquired personal association data to the data transfer device.
Further, the data transferring device may respond to any one of the credit request, the personal associated data authorization request, the data verification request, the data acquisition request, and the like, and broadcast the responded request to each data holder in the coalition chain network. The request responded to by the data relay device may be from a server in the data streaming system, and the request responded to by the data relay device may include summary information of the requested personal association data. After receiving the request, each data holder can send the personal associated data corresponding to the summary information in the request to the data transfer device. Thus, the data transfer device may obtain the requested personal association data in real time in response to the request.
In another manner of acquisition, the data transfer system may further include a first database for storing personal association data acquired by the data relay device from the respective data holders. In one example, the first database may store therein all personal association data held by the respective data holders. In another example, a portion of the personal association data held by each data holder may be stored in the first database. In this example, the data relay apparatus may perform a light-weight process on the acquired individual related data after acquiring the individual related data of each data holder, for example, may delete unnecessary data in the individual related data, may perform a deduplication process on the individual related data, or the like. Through the data light weight processing, the data volume of the data stored in the first database is reduced, so that the storage space of the first database is saved.
In one example of the above-described acquisition manner, each data holder may transmit the obtained new personal association data to the data relay device when acquiring the new personal association data, and then the data relay device stores the received personal association data in the first database.
In another example of the above-described acquisition method, the data relay device broadcasts the individual related data acquisition requests in the coalition chain network at specified time intervals, and each data holder who receives the individual related data acquisition requests can transmit the individual related data that is not provided to the data relay device. In this example, each data holder may determine whether the personal association data has been provided to the data relay device by way of a flag, e.g., each data holder may flag the personal association data that has been provided to the data relay device, while the untagged personal association data is personal association data that has not been provided to the data relay device. Further, each data holder may also determine, as the personal association data not provided to the data relay device, the personal association data acquired in the period between the currently received personal association data acquisition request and the adjacent last received personal association data acquisition request.
In another manner of obtaining, the data circulation system may further include a second database for storing correspondence between each data holder and summary information of the personal association data held by the data holder.
When the data transfer device receives any one of the credit request, the personal associated data authorization request, the data verification request, the data acquisition request and the like, the request received by the data transfer device can comprise abstract information corresponding to the requested personal associated data. At this time, the data relay device may determine, in response to the received request, a data holder corresponding to the summary information in the request from the second database, and then acquire corresponding personal association data from the determined data holder. In one example, the data relay device may actively request the determined data holder for the personal association data corresponding to the summary information.
Further, the data relay device may be further configured to record usage trace information of the personal association data on the first blockchain when the personal association data in the coalition chain network is used.
In the present disclosure, the personal association data in the federated chain network may include personal association data held by any data holder in the federated chain network. The situation in which the personal association data is used may include any of the following situations: the personal association data is used for personal credit, the personal association data is used for authorization, the personal association data is used for data verification, the personal association data is requested to be used by another party, and the like.
In the present disclosure, the usage trace information of the personal association data may include at least a data user who is a party using the personal association data and a data holder who is a party holding ownership of the personal association data, corresponding to the personal association data. Further, the usage trace information may also include a person corresponding to the person-associated data, a time when the person-associated data is used, summary information of the person-associated data, and the like. Wherein the person corresponding to the person-associated data is the object for which the person-associated data is directed, e.g., the person corresponding to a set of loan data is Zhang Santa, then the loan data is related data of Zhang Santa loan.
The data transfer device is used for recording the usage trace information of the personal associated data when the personal associated data is used each time on the first blockchain, and the benefit distribution is conveniently carried out by the data transfer system according to the usage trace information recorded on the first blockchain based on the non-tamperable characteristic of the blockchain, for example, rewards are given to a data holder. The individual associated data held by each data holder is commercialized in this way, so that each data holder is maintained as a blockchain node in the alliance chain network to continue to provide the individual associated data for the data circulation system, and in addition, the source of the individual associated data is widened by attracting more data holders to join the alliance chain network in a way that the individual associated data is commercialized.
In the process that the data transfer device records the usage trace information on the first blockchain, the data transfer device can be used as an accounting node to package the usage trace information to be uplink into a block, and the block can comprise the usage trace information and a corresponding hash value. Then, the data transfer device broadcasts the block to the consensus nodes in the alliance chain network to perform consensus processing, and after the consensus nodes reach consensus, the data transfer device can record the block on the first block chain.
Fig. 4 shows a schematic diagram of an example of a consensus process according to an embodiment of the present disclosure. In this disclosure, the usage trace information and corresponding hash values may be considered transaction data in the first blockchain. In the example of fig. 4, the blockchain node where the data relay device is located acts as a master node (i.e., an accounting node, hereinafter referred to as master node R0) of the blockchain network.
The master node R0 broadcasts the packaged blocks to all consensus nodes in the blockchain network for consensus processing, e.g., the master node R0 broadcasts the packaged blocks to the backup nodes R1, R2, and R3 for consensus processing. Note that the consensus process is shown as comprising 4 network nodes R0, R1, R2 and R3 for illustration purposes only, and the consensus process may also comprise any suitable number of network nodes.
In embodiments of the present disclosure, the consensus process may be implemented using PoW (workload certification algorithm), poS (rights certification algorithm), PBFT (practical bayer fault tolerance algorithm), and so on. The following description will take PBFT consensus process as an example.
As shown in fig. 4, the process of PBFT consensus processing includes: a Pre-preparation phase (Pre-preparation) 410, a preparation phase (preparation) 420, and a confirmation phase (Commit) 430.
Specifically, at 410, the master node R0 packages the usage trace information to be recorded into the first blockchain into a message m, then generates a Pre-prepare message Pre-prepare, and sends (e.g., broadcasts) the Pre-prepare message Pre-prepare to the backup nodes R1, R2, and R3 for a given time interval. The Pre-prepare message Pre-prepare indicates that the master node R0 is initiating a consensus process.
In an embodiment of the present disclosure, as shown in fig. 5, the format of the Pre-prepare message Pre-prepare may be: PRE-PREPARE, epoch, seq, D (m), signature-p >, m, j >. Here, "PRE-PREPARE" represents the protocol identification of the PRE-PREPARE message, "epoch" represents the age when R0 is the master node, "seq" represents the proposal number of the proposal of the required consensus (i.e., adding the chunk to the blockchain 216), "D (m)" represents the digest of the request message set, "signature-p" represents the signature of R0, "m" represents the specific content of the request message (i.e., the specific content of each piece of authentication information in the chunk), and "j" represents the node identification of R0. Here, D (m) is obtained by performing hash computation on each set of authentication information in the block.
In the preparation stage 420, for each backup node (R1, R2, or R3), after receiving the Pre-preparation message Pre-preparation and detecting that the Pre-preparation message Pre-preparation is valid, the Pre-preparation message Pre-preparation may be stored in a local log, and a preparation message preparation for responding to the Pre-preparation message Pre-preparation may be generated, and the generated preparation message preparation may be broadcast to other nodes. The Prepare message Prepare indicates that the backup node has received the Prepare message Pre-Prepare from the primary node and is sending a reply in response to the Prepare message Pre-Prepare.
Accordingly, each backup node also receives the Pre-prepare message Pre-prepare sent by the other backup nodes. Taking the backup node R1 as an example, after receiving the preparation message Pre-Prepare sent by the master node R0, the backup node R1 broadcasts the generated preparation message Prepare to the master node R0 and the backup nodes R2 and R3. Accordingly, backup node R1 also receives the Prepare message Prepare sent by master node R0, backup nodes R2 and R3.
In this disclosure, the Prepare message Prepare broadcast by the backup node may be used to represent the consensus commitment made by the backup node in the Prepare phase 420.
In this specification, as shown in fig. 5, the format of the preparation message preparation may be: < PREPARE, epoch, seq, D (m), i, signature-i >. Here, "PREPARE" indicates a protocol identification of the preparation message preparation, "i" indicates a node identification of a node transmitting the preparation message preparation, and "signature-i" indicates a signature of a node transmitting the preparation message preparation. The meaning of "epoch", "seq", and "D (m)" in the preparation message preparation is the same as that of "epoch", "seq", and "D (m)" in the above-described preparation message Pre-preparation.
In the acknowledgement phase 430, when the network node receives a sufficient number of preparation messages preparation from other network nodes, the network node determines that a consensus has been reached. For example, if primary node R0 or backup node R1, R2 or R3 receives a number of Quorum (e.g., 2f+1, where f represents the number of failed network nodes) Prepare message Prewire, then it is determined that a consensus is reached between the network nodes. The primary node R0 or the backup node R1, R2 or R3 will then broadcast an acknowledgement message command to the other nodes.
In this specification, as shown in fig. 5, the format of the acknowledgement message command may be: < COMMIT, epoch, seq, D (m), p, signature-p >. Where "COMMIT" represents the protocol identification of the acknowledgement message Commit, "p" represents the node identification of the node that sent the acknowledgement message Commit, and "signature-p" represents the signature of the node that sent the acknowledgement message Commit. The meaning of "epoch", "seq" and "D (m)" in the acknowledgement message command is the same as that of "epoch", "seq" and "D (m)" in the above-described Pre-preparation message Pre-preparation.
In this description, a node sends and stores an acknowledgment message Commit to the local log to represent the consensus commitment made by the node in the acknowledgment phase 430.
After consensus is reached for the initiated proposal as above, the master node records the block into the blockchain, thereby completing the recording of the usage trace information and corresponding hash values into the blockchain.
In one example of the present disclosure, the data relay device may be further configured to record summary information of each individual-associated data held by each data holder in the coalition chain network and an identification of the data holder on the second blockchain correspondingly.
In this example, the second blockchain may be different from the first blockchain. In the process that the data transfer device records the summary information and the corresponding identifier of the data holder on the second blockchain, the data transfer device can be used as an accounting node to package the summary information to be uplink and the corresponding identifier of the data holder into a block, and the block can comprise the summary information, the corresponding first hash value, the identifier and the corresponding second hash value. Then, the data transfer device can broadcast the block to the consensus nodes in the alliance chain network to perform consensus processing, and after the consensus nodes reach consensus, the data transfer device can record the block on the second block chain.
In this example, the summary information recorded on the second blockchain corresponds to an identification of the data holder, each summary information corresponding to an identification of the data holder. By recording summary information of the personal association data held by each data holder on the second blockchain, all data holders in the federated chain network and the data streaming mechanism query the summary information on the second blockchain, so that each party knows the type of personal association data held by each other. When the data circulation system or any data holder needs to request the personal association data, the data holder holding the requested personal association data can be determined according to the abstract information recorded on the second blockchain and the corresponding identifier, and then the data circulation system can directly request the personal association data from the determined data holder. By the method, the data holder for holding the required personal association data is determined from the plurality of data holders in a targeted manner, and the acquisition efficiency of the personal association data is improved.
In one example, when the summary information includes private information, the private information in the summary information may be desensitized to hide the private information, thereby avoiding privacy disclosure. In one example, the desensitization may be performed by performing a partial confusion replacement process on private information such as a name, an identification card number, an address, etc., for example, replacing a part of the private information with a designated code, a number, a symbol, etc. For example, when the summary information includes the identification card number, the first 4 bits and the last 4 bits of the identification card number can be reserved, and other numbers are replaced by signs, so that the identification card number can be hidden, and leakage of the identification card number is avoided. In this example, because the privacy information in the summary information is incomplete, the data circulation system or the data holder that requests the personal association data may determine the corresponding summary information from the second blockchain in a fuzzy matching manner, that is, the requested personal association data may be matched with the information that is not hidden in the determined summary information. The data holder who actually holds the requested personal association data is then further screened from the determined data holders.
In the present disclosure, the server may receive a personal association data authorization request from the data requester, and the received personal association data authorization request may include personal characteristic information of an authorization object, which is a person to which personal association data to be authorized corresponds. For example, if the individual related data of the individual a includes data such as deposit, real estate, stock, and loan of the individual a, the authorized object at this time is a, and the individual corresponding to the individual related data is a.
In one example, the personal association data authorization request may also include usage information for the requested personal association data, which may be used to determine a usage range of the authorized personal association data, which the data requester may only use within the usage range indicated by the usage information after the data requester has obtained authorization.
Further, in one example, the personal association data authorization request may include an authorization request form, which may include information of an authorized person, an authorization issue, usage information, an authorization period, a liability agreement, an agreement statement, a signature, and the like. Wherein the authorized person information may be information of the data requester.
After receiving the personal association data authorization request, the server responds to the personal association data authorization request and forwards the personal association data authorization request to an authorization object, and the authorization object decides whether to grant the authorization. If the authorization object does not agree with the authorization, the information of disagreement with the authorization is fed back to the server, and the server is further transferred to the data requesting party to inform the data requesting party that the data requesting party does not acquire the authorization. If the authorization object agrees to the authorization, information that agrees to the authorization is fed back to the server, which in one example may include a personal association data right signed by the authorization object.
After the server is authorized by the authorized object, the server may obtain personal association data of the authorized object from the data transfer device or the first database. In particular, in one example, where the data flow system includes a first database, the server may obtain personal association data of the authorized object directly from the first database. In another example, in the case where the server acquires the personal association data of the authorized object directly from the data relay device, the server sends a request including summary information of the personal association data to be acquired to the data relay device, and the data relay device may acquire the personal association data of the authorized object by broadcasting in the coalition chain network, and may also acquire the personal association data of the authorized object by using the second database.
After acquiring the personal association data of the authorization object, the server may send the acquired personal association data to the data requester to complete the authorization. In one example, the server may grant the obtained personal association data to the data requesting party within the usage range determined by the usage information, such that the usage range of the authorized personal association data may be limited, thereby avoiding misuse of the personal association data.
In one example, after the authorization request of the data requester is granted, the personal association data of the authorization object may be used, at which time the data relay device may record usage trace information of the personal association data of the authorization object on the first blockchain.
Specifically, after the data circulation system completes authorization, the server may further determine information of the authorization object from personal association data authorized to the data requester, for example, if the authorized personal association data is financial asset data for person a, the personal association data includes personal characteristic information such as name, identification card number and the like of person a, and from the personal association data, it may be determined that the authorization object is a, and the personal characteristic information of a may be obtained.
The server may also determine, from the authorized personal association data, a data holder of the personal association data, the data holder holding ownership of the authorized personal association data. In one example, when the server obtains the personal association data from the first database, the first database records therein data holder information corresponding to the personal association data, and the server may determine, from the data holder information recorded in the first database, the data holder corresponding to the authorized personal association data. In another example, when the server receives the personal association data from the data relay device, the data relay device may transmit information of the data holder who transmitted the authorized personal association data to the server, whereby the server may determine the data holder of the authorized personal association data.
After determining the authorized object and the data holder corresponding to the authorized personal association data, the server may generate usage trace information for the authorized personal association data according to the determined authorized object, data holder and data requester. The generated usage trace information may include an authorized object, a data holder, and a data requester. Then, the server transmits the generated usage trace information to the data relay device, and the data relay device records the received usage trace information on the first blockchain.
In one example, the usage trace information may also include usage information for personal association data that is authorized for use.
In one example, the server may also perform benefit allocation for the authorized object and the data holder based on usage trace information of the personal association data recorded on the first blockchain. Such as awarding points, money, etc. The server may also collect corresponding data usage fees from the data requesting party for payment to the authorizing object and the data holding party. Wherein the distribution rules and the fee collection rules of the rewards may be decided by a common negotiation of individual data holders in the data transfer system and the federated chain network.
In one example of the present disclosure, the server may be configured to obtain corresponding personal association data according to personal characteristic information of a credit object in a credit request in response to the credit request of the personal credit requester, perform credit processing on the obtained personal association data to obtain personal credit information, and send the obtained personal credit information to the personal credit requester.
The personal credit requester may be any data holder in the federated chain network, or may be any third party. The credit request sent by the personal credit requester may include personal characteristic information of the credit object, such as name, identification number, face characteristics, etc. The personal characteristic information of the credit object is the same as or matches with the summary information of the corresponding personal association data, for example, the summary information of each personal association data includes a name and an identification card number, and the personal characteristic information in the credit request also includes a name and an identification card number.
The credit processing may include integrating, deduplicating, extracting, classifying, etc. the personal association data. Data integration is the integration of all personal association data acquired from individual data holders. Data deduplication is the deletion of duplicate personal association data from the integrated personal association data to reduce personal association data. The data extraction is to extract the specified type of personal association data from the personal association data, for example, the specified type of data is financial asset data, and then the financial asset data is extracted from the acquired personal association data for personal credit. The data classification is that the individual association data of the credit object can be divided into individual asset data and individual liability data, or into individual principal association data of the credit object and individual associated legal principal association data, according to the requirements.
In one example, when the data transfer system further includes a first database for storing the personal association data acquired by the data relay device from each data holder, the server may further acquire the personal association data associated with the personal feature information from the first database according to the personal feature information of the authorized object. Specifically, the server matches the personal characteristic information with the personal association data in the first database, and determines the personal association data matched with the personal characteristic information as personal association data associated with the personal characteristic information.
In another example, the server may forward the credit request to a data relay device, which obtains corresponding personal association data from each data holder in real time according to the credit request. Specifically, in one example, the data relay device may broadcast a credit request to each data holder, and the data holder holding the personal association data associated with the personal characteristic information in the credit request may send the corresponding personal association data to the data relay device. In another example, when the data transfer system further includes a second database, the data relay device may determine, from the second database, a data holder corresponding to the summary information that matches the personal characteristic information in the credit request, and then may acquire corresponding personal association data from the determined data holder.
After the data relay device acquires the personal association data, the data relay device may send the acquired personal association data to the server. After the server receives the personal association data acquired by the data transfer device from the data transfer device, credit investigation processing is carried out on the received personal association data so as to acquire personal credit investigation information.
In one example, the server may divide the personal association data of each credit object into two categories of personal asset data and personal liability data in the course of credit processing of the personal association data, and then sort the divided personal asset data and personal liability data in both lateral and longitudinal dimensions, respectively.
Specifically, for the personal asset data of each credit object, the data category related to the personal asset data may be counted in the lateral dimension, and the personal asset data may be sorted according to each counted data category. Through data arrangement in the transverse dimension, the data category related to the personal asset data of the credit object can be obtained, so that the field related to the personal asset data can be known, personal credit is carried out based on the personal association data of the related wide and different fields, and the comprehensiveness of the personal credit is improved.
In addition, for the personal asset data of each credit investigation object, deep mining and arrangement can be carried out on the personal asset data of each data category in the longitudinal dimension, and the relevance among the personal asset data belonging to the same data category can be mined, so that the relevance among the personal asset data can be reflected in a deeper degree, the personal credit investigation information of the credit investigation object can be reflected more accurately, and the accuracy of the personal credit investigation is improved.
Accordingly, the personal liability data of each credit investigation object can be arranged in the transverse dimension, so that the liability condition of the credit investigation object can be known more widely and comprehensively. Personal liability data can also be sorted in the longitudinal dimension, and the liability conditions which are not easy to find are reflected by mining the relevance between the personal liability data. By data arrangement of the transverse dimension and the longitudinal dimension, comprehensiveness and accuracy of personal credit are improved.
In one example of the present disclosure, the data transfer system may further include a data verification device for performing data verification through a data verification interface provided by a government functional department, and the data verification device may be communicatively connected with the data transfer device and the server, respectively.
In this example, government functional departments may include public security, tax, business, social security, public accumulation, education department, and the like, each provided with a data verification interface to the data verification device, with different government functional departments corresponding to different data verification interfaces. The data verification device can provide the data to be verified to the corresponding government functional departments through the data verification interface, the government functional departments verify the data, and the data verification device is fed back with the verification result through the data verification interface.
In this example, any party in the federated chain network (including the various data holders and data relay devices in the data transfer system) may challenge the correctness of any personal association data in the federated chain network. For example, the data holder E and the data holder F in the federation chain network both hold personal association data for the individual a, where the identification card number of a in the personal association data held by the data holder E is different from the identification card number of a in the personal association data held by the data holder F, at which point the data holder E may question the personal association data in the data holder F.
For another example, after acquiring the personal association data for the same person, the data transfer device may verify the acquired personal association data, and if there is a difference in the records of the same information in the personal association data, the data transfer device may challenge the correctness of the personal association data.
Any data holder or data transfer device in the alliance chain network can initiate a data verification request when making a question for personal associated data, and send the initiated data verification request to the data verification device. The data verification request may include the personal association data to be verified and the data holders corresponding to the personal association data.
The data verification device responds to the data verification request, acquires the personal association data to be verified from the data verification request, and provides the personal association data to be verified for the corresponding government functional departments through the data verification interface to carry out data verification. After the government functional departments complete data verification, the data can be fed back to the data verification device through the corresponding data verification interfaces. The data verification device may send the verification result to the data relay device. The data relay device may broadcast the verification result to the respective data holders. When the verification result indicates that the verified personal association data is correct, each data holder is facilitated to strengthen and confirm the correctness of the verified personal association data, and when the verification result indicates that the verified personal association data is wrong, the data holder holding the personal association data is facilitated to correct the personal association data.
In one example, when the verification result indicates that the verified personal association data is erroneous, the data verification device may further send the verification result to the server, where the verification result includes the party initiating the data verification request, the verified personal association data, and the corresponding data holder. After the server receives the verification result, the party initiating the data verification request, the verified personal association data and the corresponding data holder can be determined from the verification result. And then, the server generates data verification information corresponding to the personal association data according to the determined party initiating the data verification request and the data holder corresponding to the personal association data with errors, and sends the generated data verification information to the data transfer device, and the data transfer device records the received data verification information on the first block chain.
In one example, when the party that initiates the data verification request is a data transfer device in the data circulation system, since the data circulation system does not need to be rewarded as a rule maker, the server may generate the data verification information for the personal association data only according to the data holder corresponding to the personal association data that has been verified to be wrong. At this time, only the data holder is included in the data verification information.
Through the above two examples, the data circulation system may determine a punishment object according to the data verification information recorded on the first blockchain, when the verification result indicates that the verified personal association data is wrong, the party initiating the data verification request is the party being rewarded, and the data holder holding the personal association data verified to be wrong is the party being punished. Through the reward and punishment mechanism, each party in the alliance chain network can be effectively stimulated to verify the personal association data, so that errors of the personal association data in the alliance chain network are reduced.
In one example of the present disclosure, the server may be further configured to obtain personal association data of the authorized object from the data relay device or the first database. In particular, in one example, where the data flow system includes a first database, the server may obtain personal association data of the authorized object directly from the first database. In another example, in the case where the server acquires the personal association data of the authorized object directly from the data relay device, the server may send a request including summary information of the personal association data to be acquired to the data relay device, and the data relay device may acquire the personal association data of the authorized object by broadcasting in the coalition chain network, and may also acquire the personal association data of the authorized object by using the second database.
After the server acquires the personal association data of the authorized object, the server may desensitize the acquired personal association data. In one example, the manner of desensitization processing may be a partial confusion replacement processing. For example, the name "Zhang San", in the personal association data, is subjected to desensitization processing, one word in the name is replaced with a symbol, and the replaced name is named Zhang. In another example, the manner of desensitization processing may remove all private information in the personal association data, leaving only non-private information.
After the server completes the desensitization processing on the personal association data, the desensitized personal association data can be sent to the data requesting party. In one example, the server may encrypt the desensitized personal association data before sending the personal association data, and then send the encrypted personal association data to the data requester.
In one example, after the server obtains the personal association data of the authorized object, the server may determine the privacy level to which the personal association data belongs, and when the personal association data belongs to the first class or the second class, the personal association data needs to be desensitized. When the personal association data belongs to the third class, whether the personal association data contains the privacy information is further judged, if so, the desensitization processing is carried out on the contained privacy information, and if not, the personal association data can be directly sent to a data requesting party. When the personal association data belongs to the fourth class, the personal association data may be directly transmitted to the data requester.
In one example, the server may further determine, when acquiring the personal association data of the authorization object, a data holder corresponding to the personal association data of the authorization object, where the determined data holder holds ownership of the personal association data of the authorization object. In one example, when the server acquires the personal association data from the first database, the server may determine the data holder corresponding to the personal association data of the authorized object from the data holder information recorded in the first database. In another example, when the server receives the personal association data from the data relay apparatus, the data relay apparatus may transmit information of the data holder corresponding to the personal association data of the authorized object to the server, and thereby the server may determine the data holder corresponding to the personal association data of the authorized object.
After determining the data holder, the server may generate usage trace information for the requested personal association data according to the determined data holder and the data requester, and send the generated usage trace information to the data transfer device. The data relay device records the received usage trace information on the first blockchain.
The data transfer device records the usage trace information for the data acquisition request on the first blockchain, so that the data transfer system can allocate benefits for the data holder according to the usage trace information recorded on the first blockchain. The source of personal association data is extended by attracting more data holders to join the federated chain network using a fee-charging, data-profit-providing manner.
Fig. 6 illustrates a flowchart of one example 600 of a blockchain-based data streaming method in accordance with embodiments of the present disclosure.
The data streaming method shown in fig. 6 may be performed by a data streaming system including a data relay device and a server communicably connected to the data relay device, the data relay device and each data holder forming a coalition chain network.
As shown in fig. 6, at 610, in response to a personal association data authorization request of a data requester, the personal association data authorization request is forwarded to an authorized object.
At 620, when the authorization object agrees to the authorization, corresponding personal association data from each data holder is obtained based on the personal characteristic information of the authorization object.
At 630, the personal association data is sent to the data requestor.
At 640, corresponding usage trace information is generated from the personal association data and the data requestor and recorded on the first blockchain. The usage trace information at least comprises a data usage party and a data holder corresponding to the personal association data.
In one example, corresponding personal association data may also be obtained from the first database according to personal characteristic information of the authorized object, where the first database in the data circulation system is used to store the personal association data obtained from each data holder by the data transfer device.
In one example, in response to a personal association data authorization request sent by a server, determining a data holder corresponding to summary information matched with personal characteristic information of an authorized object from a second database, and acquiring corresponding personal association data from the determined data holder; and a server configured to receive the acquired personal association data from the data relay apparatus. The second database in the data circulation system is used for storing the corresponding relation between each data holder and the summary information of the personal association data held by the data holder.
In one example, the acquired personal association data may also be authorized to the data requesting party within the range of use determined by the usage information. Wherein the usage information is included in the personal association data authorization request and in the usage trace information.
In one example, the authorization object and the corresponding data holder may also be determined from the authorized personal association data, and usage trace information for the personal association data may be generated from the determined authorization object, data holder, and data requester; and a data relay device configured to record the usage trace information generated by the server in the first blockchain.
In one example, benefit allocations may also be made to the authorized object, the data holder, and the data requester based on usage trace information of the personal association data recorded on the first blockchain.
In one example, in response to a data verification request initiated by any data holder or data transfer device in the federation chain network, the personal associated data to be verified is provided to the corresponding government functional department through the data verification interface to perform data verification, and a verification result is obtained from the government functional department.
In one example, personal association data of an authorized object is acquired from a data relay device or a first database, desensitization processing is performed on the acquired personal association data, and the desensitized personal association data is sent to a data requester.
In one example, summary information of the individual associated data held by each data holder may also be recorded on the second blockchain in correspondence with the identity of the data holder.
Fig. 7 illustrates a block diagram of one example of a blockchain-based data streaming device 700 in accordance with embodiments of the present disclosure.
The data transfer device 700 shown in fig. 7 is applied to a data transfer system including a data transfer device and a server communicably connected to the data transfer device, the data transfer device and each data holder forming a coalition chain network.
As shown in fig. 7, the data streaming apparatus 700 includes an authorization request forwarding unit 710, a data acquisition unit 720, a data transmission unit 730, and an information recording unit 740.
The authorization request forwarding unit 710 is configured to forward the personal association data authorization request to the authorization object in response to the personal association data authorization request of the data requester.
The data acquisition unit 720 is configured to acquire corresponding personal association data from the respective data holders according to the personal characteristic information of the authorization object when the authorization object agrees to the authorization.
The data transmitting unit 730 is configured to transmit the personal association data to the data requester.
The information recording unit 740 is configured to generate corresponding usage trace information according to the individual association data and the data requester, and record the usage trace information on the first blockchain, wherein the usage trace information includes at least a data user and a data holder for the individual association data.
Embodiments of a blockchain-based data streaming system, data streaming method, and apparatus according to embodiments of the present disclosure are described above with reference to fig. 1 through 7.
The data flow device of the present disclosure may be implemented in hardware, or may be implemented in software, or a combination of hardware and software. Taking software implementation as an example, the device in a logic sense is formed by reading corresponding computer program instructions in a memory into a memory by a processor of a device where the device is located. In the present disclosure, the data circulation apparatus may be implemented using an electronic device, for example.
Fig. 8 illustrates a block diagram of an electronic device 800 for implementing a blockchain-based data streaming method in accordance with embodiments of the present disclosure.
As shown in fig. 8, an electronic device 800 may include at least one processor 810, a memory (e.g., a non-volatile memory) 820, a memory 830, and a communication interface 840, and the at least one processor 810, the memory 820, the memory 830, and the communication interface 840 are connected together via a bus 850. At least one processor 810 executes at least one computer-readable instruction (i.e., the elements described above as being implemented in software) stored or encoded in memory.
In one embodiment, computer-executable instructions are stored in memory that, when executed, cause the at least one processor 810 to: responding to the personal association data authorization request of the data requesting party, and forwarding the personal association data authorization request to an authorization object; when the authorization object agrees to authorization, corresponding personal association data from each data holder is acquired according to the personal characteristic information of the authorization object; transmitting the personal association data to a data requester; and generating corresponding usage trace information according to the personal association data and the data requesting party, and recording the usage trace information on the first blockchain, wherein the usage trace information at least comprises a data using party and a data holding party corresponding to the personal association data.
It should be appreciated that the computer-executable instructions stored in the memory, when executed, cause the at least one processor 810 to perform the various operations and functions described above in connection with fig. 1-7 in various embodiments of the present disclosure.
According to one embodiment, a program product, such as a machine-readable medium, is provided. The machine-readable medium may have instructions (i.e., the elements described above implemented in software) that, when executed by a machine, cause the machine to perform the various operations and functions described above in connection with fig. 1-7 in various embodiments of the disclosure.
In particular, a system or apparatus provided with a readable storage medium having stored thereon software program code implementing the functions of any of the above embodiments may be provided, and a computer or processor of the system or apparatus may be caused to read out and execute instructions stored in the readable storage medium.
In this case, the program code itself read from the readable medium may implement the functions of any of the above-described embodiments, and thus the machine-readable code and the readable storage medium storing the machine-readable code form part of the present invention.
Computer program code required for operation of portions of the present description may be written in any one or more programming languages, including an object oriented programming language such as Java, scala, smalltalk, eiffel, JADE, emerald, C ++, c#, VB, NET, python and the like, a conventional programming language such as C language, visual basic 2003, perl, COBOL2002, PHP and ABAP, a dynamic programming language such as python, ruby and groovy, or other programming languages and the like. The program code may execute on the user's computer or as a stand-alone software package, or it may execute partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any form of network, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or the connection may be made to the cloud computing environment, or for use as a service, such as software as a service (SaaS).
Examples of readable storage media include floppy disks, hard disks, magneto-optical disks, optical disks (e.g., CD-ROMs, CD-R, CD-RWs, DVD-ROMs, DVD-RAMs, DVD-RWs), magnetic tapes, nonvolatile memory cards, and ROMs. Alternatively, the program code may be downloaded from a server computer or cloud by a communications network.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
Not all steps or units in the above-mentioned flowcharts and system configuration diagrams are necessary, and some steps or units may be omitted according to actual needs. The order of execution of the steps is not fixed and may be determined as desired. The apparatus structures described in the above embodiments may be physical structures or logical structures, that is, some units may be implemented by the same physical entity, or some units may be implemented by multiple physical entities, or may be implemented jointly by some components in multiple independent devices.
The term "exemplary" used throughout this specification means "serving as an example, instance, or illustration," and does not mean "preferred" or "advantageous over other embodiments. The detailed description includes specific details for the purpose of providing an understanding of the described technology. However, the techniques may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form in order to avoid obscuring the concepts of the described embodiments.
The alternative implementation manner of the embodiment of the present disclosure has been described in detail above with reference to the accompanying drawings, but the embodiment of the present disclosure is not limited to the specific details in the foregoing implementation manner, and various simple modifications may be made to the technical solutions of the embodiment of the present disclosure within the scope of the technical concept of the embodiment of the present disclosure, which all fall within the protection scope of the embodiment of the present disclosure.
The previous description of the disclosure is provided to enable any person skilled in the art to make or use the disclosure. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the scope of the disclosure. Thus, the disclosure is not limited to the examples and designs described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (16)
1. A data transfer system based on block chain comprises a data transfer device and a server which is connected with the data transfer device in a communication way, wherein the data transfer device and each data holder form a alliance chain network,
The data transfer device is configured to acquire personal association data from the respective data holders, and record usage trace information of the personal association data on a first blockchain when the personal association data in the alliance chain network is used, wherein the usage trace information at least comprises a data user and a data holder corresponding to the used personal association data; and
The server is configured to respond to a personal association data authorization request of a data requesting party, forward the personal association data authorization request to an authorization object, acquire the personal association data of the authorization object from the data transfer device after the authorization object agrees to authorization, and send the acquired personal association data to the data requesting party.
2. The data transfer system of claim 1, wherein the data transfer system further comprises a first database for storing personal association data acquired by the data transfer device from the respective data holders,
The server is configured to acquire corresponding personal association data from the first database according to the personal characteristic information of the authorized object.
3. The data flow system according to claim 1, wherein the data flow system further comprises a second database for storing correspondence between each data holder and summary information of the personal association data held by the data holder,
The data transfer device is configured to respond to the personal associated data authorization request sent by the server, determine a data holder corresponding to summary information matched with personal characteristic information of the authorization object from the second database, and acquire corresponding personal associated data from the determined data holder; and
The server is configured to receive the acquired personal association data from the data relay device.
4. The data flow system according to claim 1, wherein the personal association data authorization request includes usage information of the requested personal association data, the usage trace information includes usage information of the personal association data authorized for use,
The server is configured to authorize the acquired personal association data to the data requesting party within a range of use determined by the usage information.
5. The data flow system of claim 1, wherein the usage trace information further comprises an authorization object,
The server is configured to determine the authorized object and the corresponding data holder according to the authorized personal association data, and generate the usage trace information for the personal association data according to the determined authorized object, the data holder and the data requester; and
The data relay device is configured to record the usage trace information generated by the server in the first blockchain.
6. The data flow system of claim 5, wherein,
The server is configured to collect corresponding data usage fees from the data requesters for payment to the authorized object and the data holders based on the usage trace information of the personal association data recorded on the first blockchain.
7. The data flow system of claim 1, wherein the data flow system further comprises data verification means for performing data verification via a data verification interface provided by a government authority, the data verification means being communicatively coupled to the data transfer means and the server, respectively,
The data verification device is configured to respond to a data verification request initiated by any data holder or the data transfer device in the alliance chain network, provide the personal associated data to be verified to the corresponding government functional departments through the data verification interface to carry out data verification, and acquire a verification result from the government functional departments.
8. The data flow system of claim 7, wherein when the verification result indicates that the verified personal association data is erroneous,
The server is configured to receive the verification result from the data verification device, and generate data verification information corresponding to the verified personal association data according to the verification result, wherein the verification result comprises a party initiating the data verification request and a data holder corresponding to the verified personal association data; and
The data relay device is configured to record the data verification information on the first blockchain.
9. The data flow system of claim 2, wherein,
The server is configured to acquire the personal association data of the authorized object from the data transfer device or the first database, perform desensitization processing on the acquired personal association data, and send the desensitized personal association data to the data requester.
10. The data flow system of claim 1, wherein,
The data relay device is configured to record summary information of the individual related data held by each data holder and an identification of the data holder on the second blockchain correspondingly.
11. The data flow system of claim 1, wherein the personal association data includes personal asset data and personal liability data.
12. The data flow system of claim 11, wherein,
The server is configured to divide the personal association data of the credit object into personal asset data and personal liability data, sort the divided personal asset data and personal liability data in the transverse dimension and the longitudinal dimension respectively, and obtain personal credit information according to the sorted personal asset data and personal liability data.
13. The data flow system of claim 12, wherein, when the credit object is associated with business information, the credit object's personal association data includes the credit object's personal subject association data and legal subject association data.
14. A data transfer method based on a block chain, the data transfer method being performed by a data transfer system comprising a data transfer device and a server communicatively connected to the data transfer device, the data transfer device and each data holder forming a federated chain network,
The data flow method comprises the following steps:
responding to a personal association data authorization request of a data requesting party, and forwarding the personal association data authorization request to an authorization object;
When the authorization object agrees to authorize, corresponding personal association data from each data holder is obtained according to the personal characteristic information of the authorization object;
transmitting the personal association data to the data requestor; and
And generating corresponding usage trace information according to the personal association data and the data requesting party, and recording the usage trace information on a first blockchain, wherein the usage trace information at least comprises a data using party and a data holding party corresponding to the personal association data.
15. A data transfer device based on block chain is applied to a data transfer system, the data transfer system comprises a data transfer device and a server which is connected with the data transfer device in a communication mode, the data transfer device and each data holder form a alliance chain network,
The data flow device comprises:
At least one of the processors is configured to perform,
A memory coupled to the at least one processor, and
A computer program stored on the memory, the at least one processor executing the computer program to implement:
responding to a personal association data authorization request of a data requesting party, and forwarding the personal association data authorization request to an authorization object;
When the authorization object agrees to authorize, corresponding personal association data from each data holder is obtained according to the personal characteristic information of the authorization object;
transmitting the personal association data to the data requestor; and
And generating corresponding usage trace information according to the personal association data and the data requesting party, and recording the usage trace information on a first blockchain, wherein the usage trace information at least comprises a data using party and a data holding party corresponding to the personal association data.
16. A computer readable storage medium storing a computer program which, when executed by a processor, implements the data streaming method of claim 14.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110943572.3A CN113660097B (en) | 2021-08-17 | 2021-08-17 | Data transfer system, data transfer method and device based on block chain |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110943572.3A CN113660097B (en) | 2021-08-17 | 2021-08-17 | Data transfer system, data transfer method and device based on block chain |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN113660097A CN113660097A (en) | 2021-11-16 |
| CN113660097B true CN113660097B (en) | 2024-04-19 |
Family
ID=78480000
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202110943572.3A Active CN113660097B (en) | 2021-08-17 | 2021-08-17 | Data transfer system, data transfer method and device based on block chain |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN113660097B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115099800A (en) * | 2022-06-29 | 2022-09-23 | 蚂蚁区块链科技(上海)有限公司 | Block chain based method and device for transferring poor asset data |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109993647A (en) * | 2019-03-08 | 2019-07-09 | 西安电子科技大学 | A tax credit system and processing method based on blockchain |
| CN110414270A (en) * | 2019-08-01 | 2019-11-05 | 谈建中 | A kind of personal data protection system and method based on block chain |
| CN111046078A (en) * | 2019-11-11 | 2020-04-21 | 北京海益同展信息科技有限公司 | Block chain-based credit investigation query method and device and electronic equipment |
| CN111126964A (en) * | 2019-12-24 | 2020-05-08 | 深圳前海乐寻坊区块链科技有限公司 | Method, device, equipment and storage medium for authenticating position credit based on block chain |
| KR20210015006A (en) * | 2019-07-31 | 2021-02-10 | 김태욱 | System for processing financial information using blockchain platform |
-
2021
- 2021-08-17 CN CN202110943572.3A patent/CN113660097B/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109993647A (en) * | 2019-03-08 | 2019-07-09 | 西安电子科技大学 | A tax credit system and processing method based on blockchain |
| KR20210015006A (en) * | 2019-07-31 | 2021-02-10 | 김태욱 | System for processing financial information using blockchain platform |
| CN110414270A (en) * | 2019-08-01 | 2019-11-05 | 谈建中 | A kind of personal data protection system and method based on block chain |
| CN111046078A (en) * | 2019-11-11 | 2020-04-21 | 北京海益同展信息科技有限公司 | Block chain-based credit investigation query method and device and electronic equipment |
| CN111126964A (en) * | 2019-12-24 | 2020-05-08 | 深圳前海乐寻坊区块链科技有限公司 | Method, device, equipment and storage medium for authenticating position credit based on block chain |
Non-Patent Citations (1)
| Title |
|---|
| 面向征信的区块链模式设计与应用研究;郭树行;宋子琦;;网络与信息安全学报(第04期);全文 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN113660097A (en) | 2021-11-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10942994B2 (en) | Multicomputer processing for data authentication using a blockchain approach | |
| US10965445B2 (en) | Blockchain-based unexpected data detection | |
| US12126721B2 (en) | Reputation profile propagation on blockchain networks | |
| CN108292401B (en) | Secure digital data manipulation | |
| US11159537B2 (en) | Multicomputer processing for data authentication and event execution using a blockchain approach | |
| US11153069B2 (en) | Data authentication using a blockchain approach | |
| US10924264B2 (en) | Data validation and storage | |
| US20210390549A1 (en) | Systems and methods for building blockchains for verifying assets for smart contracts | |
| JP2020503579A (en) | Blockchain-based method and system for specifying recipients of electronic communication | |
| Wibowo et al. | Improving data security, interoperability, and veracity using blockchain for one data governance, case study of local tax big data | |
| EP3257221A1 (en) | Digital identity | |
| CN110998631A (en) | Distributed account book technology | |
| US20210272114A1 (en) | Computer system for handling securitized token and voting contracts and distribution and voting transactions | |
| US11997103B2 (en) | Graduated accounts using assertions | |
| US11663595B1 (en) | Blockchain transactional identity verification | |
| CN111095863A (en) | Blockchain-based system and method for communicating, storing and processing data on a blockchain network | |
| US20210377274A1 (en) | Distributed ledger data verification network | |
| CN112801778A (en) | Federated bad asset blockchain | |
| US20230142659A1 (en) | System and method for registering share of asset of which owner cannot be specified or ownership does not exist | |
| US12212699B2 (en) | Systems and methods for conditional distribution of aggregated cryptographic data based on a trigger | |
| CN113660097B (en) | Data transfer system, data transfer method and device based on block chain | |
| WO2021060340A1 (en) | Transaction information processing system | |
| CN115099800A (en) | Block chain based method and device for transferring poor asset data | |
| US11663590B2 (en) | Privacy-preserving assertion system and method | |
| US20240320636A1 (en) | Cheques in blockchain networks |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |